FCW Download and Table of Contents

Last issue's news
Print and online news archive


Goodbye anonymity. Hello ID superiority.
Government-issued personal identity verification cards are a form of identity proofing superior to anything available in the past, security experts say.

The security badge for the future
It could be years before agencies realize the full capabilities of the new personal identity verification cards that Homeland Security Presidential Directive 12 requires


Buzz of the Week: The e-budget is an e-milestone

DHS to modify info-sharing network
Officials want to merge 100 Web portals

Desktop security eases into place

Census says it is e-ready

Lawmakers call for a do-over



Editorial: A toast to Lee’s service
Deidre Lee's work in government is much appreciated, and she will be missed

Kelman: Learning from the Brits

Wagner: The cost analysis muddle

Nadler: An unfair bind?


Do CIOs face a glass ceiling?
Government CIOs gain more influence but are not seen as strategic decision-makers

OMB sets guidelines for fed high fliers

NSPS’ endgame?

Dee Lee: She’s stepping down after stepping up

Federal Executive Boards tidy up

From the pages of Federal Employees News Digest


Open-source myth busters
Don’t let common misconceptions about freely distributed software derail your IT strategies

From the pages of GCN.com


GSA expands Alliant awards by one
Technology contract is on hold while waiting for a federal claims court ruling

From the pages of Washington Technology


Panel: DOD software is at risk
Military should consider financial-industry model of documentation and code checks

Real ID debate isn't over

SEC could demand transparency

FERC clamps down on security


Top 10: Trends, challenges in 2008

Take the FCW.com poll


Download archive

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group